CN105471811A - Privacy space processing method and privacy space processing device - Google Patents

Privacy space processing method and privacy space processing device Download PDF

Info

Publication number
CN105471811A
CN105471811A CN201410277101.3A CN201410277101A CN105471811A CN 105471811 A CN105471811 A CN 105471811A CN 201410277101 A CN201410277101 A CN 201410277101A CN 105471811 A CN105471811 A CN 105471811A
Authority
CN
China
Prior art keywords
information
user
gesture path
encrypted message
privacy area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410277101.3A
Other languages
Chinese (zh)
Inventor
韩秦
杨磊
张霓
张锦晓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sogou Technology Development Co Ltd
Original Assignee
Beijing Sogou Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sogou Technology Development Co Ltd filed Critical Beijing Sogou Technology Development Co Ltd
Priority to CN201410277101.3A priority Critical patent/CN105471811A/en
Publication of CN105471811A publication Critical patent/CN105471811A/en
Pending legal-status Critical Current

Links

Landscapes

  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a privacy space processing method and a privacy space processing device, wherein the privacy space processing method mainly comprises the steps of setting a privacy area of which the attribute is concealed, setting non-input accessing password information for the privacy area, constructing a correspondence mapping table between the privacy area and the non-input accessing password information, selecting a data file and placing the data file into the set privacy area; monitoring and acquiring user operation information, determining a fact that the user operation information matches the non-input accessing password information in the constructed mapping table, displaying and accessing the privacy area which is mapped by the non-input accessing password information; and when a fact that the user cancels accessing of the data file in the privacy area is monitored, hiding the privacy area. The privacy space processing method and the privacy space processing device provided by the technical solution of the invention can further improve privacy space accessing safety.

Description

The method of process private space and private space processing unit
Technology category
The present invention relates to technical field of network information safety, be specifically related to process the method for private space and corresponding private space processing unit.
Background technology
Intelligent terminal refers to the equipment with multimedia function, audio frequency, video, transfer of data can be supported, by adopting open operating system, utilize the starter of operating system (launcher) to load corresponding application program (Application) and realize corresponding application function, for application program operation and content service provide platform, make a large amount of value-added service application programs, such as, call a taxi, make a reservation, make friends, video, news, weather, traffic, commodity, application program download, music picture download etc. can realize based on this platform.
Along with the communication technology, especially the development of 3G, 4G communication technology, the function of intelligent terminal from strength to strength, integrate the comprehensive terminal equipment of call, note, network insertion, video display amusement, network instant communication, e-Bank payment, online game, digital map navigation, become the important carrier of user's life, work, leisure, amusement, and play more and more important effect.
Such as, and along with the fast development of information network technique and the opening of internet, some application programs, strange friend-making, video and specific medical etc., there is the demand of privacy, thus, the fail safe of user privacy information becomes the focus of concern.
At present, when carrying out hiding to user privacy information, user need first by mobile intelligent terminal equipment connection to personal computer (PC, PersonalComputer) on, then by means of softwares such as the iTunes be arranged on PC, a series of loaded down with trivial details setting is carried out to the file attribute at user privacy information place needing to hide and the system property etc. of mobile intelligent terminal equipment.Owing to just can must carry out by means of softwares such as PC and iTunes, for there is no PC or having PC but do not install the environment of the softwares such as iTunes, then cannot carry out the hiding setting of user privacy information, and system property setting up procedure is also more loaded down with trivial details, these bring inconvenience all to the use of user.
Summary of the invention
The object of the invention is to, overcome the technical problem existing for existing user interest discovery mode, provide a kind of method and the private space processing unit that process private space, technical problem to be solved is, promotes the fail safe of private space further.
Object of the present invention and solve its technical problem and can adopt following technical scheme to realize.
According to a kind of method processing private space that the present invention proposes, wherein, set a property as the privacy area hidden, and non-input formula access code information is set for described privacy area, build the mapping table that described privacy area is corresponding with described non-input formula access code information, choose data file and put into the described privacy area of setting; Described method comprises:
Monitor and obtain user's operation information, non-input formula access code information match described in the mapping table determining described user's operation information and structure, show and enter the privacy area of described non-input formula access code information MAP;
Monitor user exit in privacy area data file access, hide described privacy area.
According to a kind of private space processing unit that the embodiment of the present invention provides, wherein, this device comprises: privacy area arranges module, mapping table builds module, data file arranges module and Access Control Module, wherein,
Privacy area arranges module, for setting a property as the privacy area hidden;
Mapping table builds module, and the described privacy area for arranging module for described privacy area arranges non-input formula access code information, builds the mapping table that described privacy area is corresponding with described non-input formula access code information;
Data file arranges module, for choosing data file and putting into the described privacy area that described privacy area arranges module;
Access Control Module, for monitoring and obtaining user's operation information, determine non-input formula access code information match described in the mapping table that described user's operation information and described mapping table build module construction, show and enter the privacy area of described non-input formula access code information MAP.
By technique scheme, method and the private space processing unit of process private space provided by the invention at least have following advantages and beneficial effect: the embodiment of the present invention is by arranging non-input formula access code information for privacy area, and user's operation information can be obtained at arbitrary display interface, mate with the non-input formula access code information arranged, in the process obtaining user's operation information, any change is there is not in corresponding display interface, like this, the information of user's operation information is inputted owing to not showing any prompting user, effectively improve the fail safe of private space access, and owing to not needing to go to specific position to access privacy area, simplify the troublesome operation that user enters privacy area, improve the business experience of user.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to technological means of the present invention can be better understood, and can be implemented according to the content of specification, and can become apparent to allow above-mentioned and other objects of the present invention, feature and advantage, below especially exemplified by preferred embodiment, be described in detail as follows.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the method flow schematic diagram of the process private space that the embodiment of the present invention provides.
Fig. 2 is the method idiographic flow schematic diagram of the process private space that the embodiment of the present invention provides.
Fig. 3 is the private space processing unit structural representation that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, the embodiment described by specification is only section Example of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are obtained successively and not through other embodiments that creative work is paid, all belong to the scope of protection of the invention.
The method of embodiment one, process private space.
Fig. 1 is the method flow schematic diagram of the process private space that the embodiment of the present invention provides.See Fig. 1, this flow process comprises:
Step 101, sets a property as the privacy area hidden, and arranges non-input formula access code information for described privacy area, build the mapping table that described privacy area is corresponding with described non-input formula access code information;
In this step, the content in private space includes but not limited to: the privacy information, application, data, picture, video etc. of user.Data file includes but not limited to: application program, picture etc.
The privacy area arranged can be one, and in subsequent applications, all data files of carrying out secret protection that needs is put into this privacy area.In the embodiment of the present invention, if after other users know this privacy area, just can know that user puts into all data files of this privacy area, thus, for improving the fail safe respectively with the data file of privacy requirements, multiple privacy area can also be set, with in subsequent applications, all data files of carrying out secret protection that needs are put into each privacy area respectively, even if make other users know a privacy area, also the data file putting into this privacy area can only be known, thus ensure the data file putting into other privacy area, promote the fail safe of privacy information.
Preferably, the store path information of privacy area can also be set, for the situation being provided with multiple privacy area, the corresponding store path information of each privacy area, store path information shows the position that privacy area stores, such as, under multiple privacy area can being separately positioned on store path corresponding to different store path information.Certainly, in practical application, the store path information that multiple privacy area is corresponding can be identical, also can be different.In the embodiment of the present invention, privacy area can carry out unique identification by privacy area title.
In the embodiment of the present invention, non-input formula access code information includes but not limited to: gesture path encrypted message and/or, speech cipher information and/or, finger-print cipher information etc. provide input encrypted message window just can carry out the information arranged without the need to terminal equipment.
In the embodiment of the present invention, preferably, interface can be set the privacy area in terminal equipment, provide that gesture path encrypted message arranges window, speech cipher information arranges window and finger-print cipher information arranges window.
When non-input formula access code information is gesture path encrypted message, the step arranging non-input formula access code information comprises:
A11, receives gesture path encrypted message and arranges request, present gesture path encrypted message and arrange window;
In this step, arrange in interface at privacy area, user can arrange window by clicking gesture path encrypted message, thus triggering generation gesture path encrypted message arranges request, terminal equipment, receiving after gesture path encrypted message arranges request, presents gesture path encrypted message and arranges window so that user is arranged.Certainly, in practical application, also can arrange in interface at privacy area, drop-down menu is provided, comprise in drop-down menu: gesture path encrypted message is set, speech cipher information is set and finger-print cipher information is set, user chooses and arranges gesture path encrypted message from drop-down menu, and triggering presents gesture path encrypted message and arranges window.
A12, acquisition user arranges the track operation in window at gesture path encrypted message, and obtains gesture path encrypted message based on the track operation obtained.
In this step, gesture path encrypted message can mark specific gesture path to realize at display interface by mouse, felt pen or finger, at present, gesture path function supported by the browser of most terminal equipment, do not support the terminal equipment of gesture path function, also can realize by installing the software pre-set, thus, in the embodiment of the present invention, carry out gesture path operation, without the need to changing the hardware configuration of terminal equipment, realization flow is simple.Further, gesture path does not need precise positioning to operate, and inputs the encrypted messages such as digital, alphabetical relative at encrypted message window, and eye fatigue and the button operation that effectively can reduce user are tired, input encrypted message required time is short, and input efficiency is higher.
Preferably, in order to improve the convenience of gesture path operation, gesture path encrypted message arranges in window the JiuGongTu providing and arrange for gesture path encrypted message, then obtain user and operation trace in window be set at gesture path encrypted message, and specifically comprise based on the step that the operation trace obtained obtains gesture path encrypted message:
A21, after monitoring user trajectory operation and JiuGongTu interracial contact, obtains the starting point that user trajectory operates in gesture path on JiuGongTu;
In this step, user trajectory operation comprises: the operation of mouse action, felt pen and finger manipulation.Namely gesture path drafting is carried out by mouse, felt pen and finger at JiuGongTu interface.
To draw gesture path by mouse, due in the process of drawing gesture path, need mouse to keep, with the contact of JiuGongTu, namely pressing left mouse button and dragging on JiuGongTu, until unclamp left mouse button disengaging to have drawn gesture path with the contact of JiuGongTu to represent always.
In the embodiment of the present invention, if user clicks a certain subgraph in JiuGongTu and residently exceed the residence time threshold value pre-set, show that user starts to arrange gesture path encrypted message, using the starting point of the subgraph of this click as gesture path.In the embodiment of the present invention, arrange and need the resident residence time threshold value pre-set that exceedes just to trigger the setting of gesture path encrypted message, be in order to avoid user is due to misoperation, such as, click at random and frequently carry out triggering consumed resource.
In the embodiment of the present invention, as embodiment, user operation track can be obtained by camera.During specific implementation, camera can be built in terminal equipment, or adopts external mode to be connected with terminal equipment.Like this, when user has made gesture path action in the visual range of camera, then camera receives this gesture path action, and by the image recognition program be set in advance in terminal equipment, this gesture path action is identified, and convert the gesture path action of identification to image, such as, image can be gray level image, coloured image, photo, video interception etc.
A22, monitoring after user trajectory operation contacts with JiuGongTu interface unbound, acquisition user trajectory operates in the terminal of gesture path on JiuGongTu;
In this step, user presses left mouse button and drags on JiuGongTu, form gesture path, if setting completed for gesture path, then unclamp left mouse button, to make mouse depart from and the contact at JiuGongTu interface, using the terminal of mouse drag last subgraph extremely before disengaging as gesture path.
A23, the starting point sequentially obtaining gesture path to gesture path terminal between subgraph in the JiuGongTu that experiences connect into line of vector, obtain gesture path encrypted message.
In this step, arrange gesture path and have vector characteristics, user operation sequentially drags on JiuGongTu, connects former and later two words figure and forms a vectorial line segment, and multiple vectorial line segment forms line of vector.Such as, for the difference dragging order of user operation in JiuGongTu between two subgraphs, the line of vector of formation is also different, thus makes the gesture path encrypted message that obtains also different.Certainly, in practical application, gesture path also can be set and not there is vector characteristics, such as, for the difference dragging order of user operation in JiuGongTu between two subgraphs, be dragged to the second subgraph by mouse from the first subgraph, and, mouse is dragged to the first subgraph from the second subgraph, thinks same operation.
In the embodiment of the present invention, preferably, each privacy area correspondence is provided with a gesture path encrypted message, and the gesture path encrypted message that each privacy area correspondence is arranged is different.As another embodiment, also multiple gesture path encrypted message can be set for privacy area.
In the embodiment of the present invention; as embodiment; in order to ensure the fail safe of user privacy information further; can also by gesture path encrypted message and existing input type access code information; such as; numeral and/or; letter code information combines; that is; when the gesture path encrypted message of user's input is correct; the input type access code information also needing user to input is correct, and user could access the data file in corresponding privacy area, thus realizes the multiple protective to privacy information.
Further, in order to ensure the accuracy that gesture path encrypted message is arranged, after obtaining gesture path encrypted message, the method also comprises:
The gesture path password authentication information that prompting user input is identical with gesture path encrypted message;
Receive gesture path password authentication information, determine that the gesture path password authentication information received mates with gesture path encrypted message, determine that gesture path encrypted message is arranged successfully.
In this step, specifically when comparing twice gesture path, can be that the feature extracted separately is compared, or adopt mode identification method to compare, by comparing the similarity calculated between twice gesture path, if similarity exceedes the similarity threshold pre-set, just can confirm that twice gesture path is identical.Certainly, the realization flows such as concrete feature extraction, pattern recognition, are known technology, omit detailed description at this.
In the embodiment of the present invention, as embodiment, after connecting into line of vector, before obtaining gesture path encrypted message, the method can further include:
The gesture path connecting into line of vector is shown on screen;
Receive the confirmation of user's input, described in execution, obtain the flow process of gesture path encrypted message.Like this, by the gesture path connecting into line of vector being shown to user on screen, user, after confirmation is correct, by clicking the ACK button on screen, triggers generation gesture path encrypted message.Thus can effectively avoid the gesture path of drawing not to be the desired gesture path inputted of user.
Arrange speech cipher information to comprise:
B11, receives speech cipher information setting request, presents speech cipher information and arrange window;
In this step, arrange in interface at privacy area, user can arrange window by clicking speech cipher information, thus trigger generation speech cipher information setting request, terminal equipment, after receiving speech cipher information setting request, presents speech cipher information and arranges window so that user is arranged.As another embodiment, the drop-down menu that user can also be arranged in interface by privacy area is chosen and is arranged speech cipher information, thus triggers and present speech cipher information and arrange window.
B12, recording user arranges the phonetic feature in window in speech cipher information, obtain speech cipher information.
In this step, when presenting speech cipher information and arranging window, can start, to record to the voice of user by the built-in recording pen of triggering terminal equipment.
In the embodiment of the present invention, because voice (sound) are the unique features of each user.Thus, safety certification can be carried out by arranging speech cipher information to privacy area.Speech cipher information includes but not limited to the various speech characteristic parameters obtaining described voice, such as, it can be the recording comprising a word that user says and the intonation of speaking, such as " I loves Tian An-men, Beijing ", user arranges input text in window (words and phrases) " I loves Tian An-men, Beijing " in speech cipher information, after " I loves Tian An-men, Beijing " recording that recording pen recording user is read aloud, recording is stored as voice document, such as, .wav file, build the mapping relations of input text and voice document and store, and as speech cipher information.Specifically, user's input is as the words and phrases " I loves Tian An-men, Beijing " of speech cipher information, user inputs rear click and starts control of recording, enter recording display interface, in recording display interface, the information comprising and allow user read aloud " I loves Tian An-men, Beijing " can be shown, after detecting that user completes and reads aloud, such as, exceeding the scheduled time does not have voice messaging, the recording of admission is done and the words and phrases of input as speech cipher information.
In practical application, can also be identified the voice that user reads aloud by speech recognition software, by digital to analog converter, the voice signal of simulation is converted to digital signal and store.
In practical application; in order to realize the maltilevel security protection of privacy information; also gesture path encrypted message can be combined with speech cipher information; such as; input accurately on basis at gesture path encrypted message; only have user voice to be recorded in terminal equipment and the user having an authority says correct speech cipher information facing to terminal equipment, the hiding data file be stored in privacy area can be accessed.Like this, the fail safe of privacy information is higher.Certainly, in practical application, also in speech cipher information accurately basis, then the gesture path of user can be mated, only have the gesture path of user to match with the gesture path encrypted message prestored, the hiding data file be stored in privacy area can be accessed.
About arranging finger-print cipher information, with above-mentioned gesture path encrypted message being set and speech cipher information is similar, no longer enumerating at this.
In the embodiment of the present invention, in the mapping table of structure, comprise the mapping relations of non-input formula access code information corresponding to one or more privacy area.Wherein, the non-input formula access code information that each privacy area is corresponding is different.
As embodiment, the mapping table of structure can be stored in the database pre-set.
As another embodiment, user ID can also be set for mapping table.Like this, in same terminal equipment, can arrange privacy area respectively for multiple user, the privacy area title that each user is arranged can be identical, and the non-input formula access code information of the corresponding privacy area of each user setting also can be identical.Table 1 arranges the signal table of the mapping table of user ID for the embodiment of the present invention.
Table 1
Step 102, chooses data file and inserts the described privacy area of setting;
In this step, after the non-input formula access code information of privacy area and correspondence is set, be placed on needing the data file of carrying out privacy access in privacy area.
In the embodiment of the present invention, for the situation being provided with multiple privacy area, according to the needs of user, to needing the data file of carrying out privacy access to classify, and the data file of classification can be put into corresponding privacy area respectively.
In the embodiment of the present invention; for data files such as QQ, micro-letter, note, strange friend-making, Video chat, Emails; user not only can expect the behavioural information of visit data file can be carried out secret protection; and/or; also expect the log information that this class data file of access produces to be carried out secret protection, namely the privacy information of the embodiment of the present invention comprises the behavioural information of user accesses data file and the log information of visit data file generation.Such as, for note, user wishes the note (log information) of transmitting-receiving also to carry out secret protection, again such as, for QQ, owing to being common data file, user does not wish this QQ data file (behavioural information of visit data file) to put into privacy area, and just wish after user's login, the chat record information (log information) produced by QQ chat when exiting QQ and logging in carries out secret protection, be stored in chat record information privacy region by chat record information, thus make user after logging in QQ next time, history chat record information is not shown at QQ display interface, only when the privacy area storing this chat record information place can be accessed, history chat record information is shown at QQ display interface.Like this, even if other users log in QQ by the QQ number of this user, owing to not showing history chat record information at QQ display interface, make other users can not obtain the history chat record information of this user, thus ensured the privacy information safety of this user.Thus, in the embodiment of the present invention, the method can further include:
Choose the privacy area of setting, and the store path information at the privacy area place chosen is set to the store path information of the log information produced for store access data file.
In this step, as previously mentioned, the data file with privacy requirements producing log information can be identical with the data file in the privacy area of inserting setting, also can be different.
In the embodiment of the present invention, by the privacy area chosen being set to the store path of the log information produced for store access data file, like this, can make log information be stored in described in the privacy area chosen, owing to being stored in privacy area, thus, also would not show this log information, thus improve the fail safe of this log information.Such as, for the note received, because terminal equipment is receiving note and just showing the note of this storage after storing to user.In the embodiment of the present invention, because the note of reception is directly stored in short message privacy region by terminal equipment, thus, can not show at terminal equipment display interface, like this, even if other users obtain the terminal equipment of this user, due to the note of reception can not be shown, thus the fail safe of note can be received by effective guarantee, and user can pass through authority (non-input formula access code information) and accesses this short message privacy region, knows and browses the note of reception.Further, when data file needs to load log information, because log information is stored in privacy area, thus, the log information of loading can be made for empty, and other users can be made to think, and this user did not access this data file.Such as, after other users use the user name of this user to log in QQ, if search the history chat record information of this user, and be stored in privacy area due to this history chat record information, thus, when searching the history chat record information of this user, be shown as sky information, other users are thought, and this user did not carry out QQ chat, real user then can access by the mode of non-input encrypted message the privacy area storing this history chat record information, thus loads this history chat record information at QQ interface.Again such as, in the embodiment of the present invention, after setting privacy area, associated person information can also be placed in this privacy area, like this, the information (such as, note and the telephony recording information stored after playing phone) that Related Contact sends can be hidden in this privacy area, and does not worry being found.
Step 103, monitors and obtains user's operation information, determines non-input formula access code information match in the mapping table of user's operation information and structure, shows and enters the privacy area of described non-input formula access code information MAP.
In this step, because privacy area is not provided with entrance access rights, thus, when carrying out authority access, click this privacy area (entrance) without the need to user, make it to trigger and eject Password Input window to notify user's input reference encrypted message (access rights), like this, other users can not know that user has privacy information in this area stores, and the fail safe that privacy information stores is higher.
In this step, user's operation information includes but not limited to one of following: user trajectory operation information, user speech operation information and user fingerprints operation information.
If user's operation information is user trajectory operation information, determine that in the mapping table of user's operation information and structure, non-input formula access code information match comprises:
C11, calculates the size of user trajectory corresponding to user trajectory operation information;
In this step, the method calculating the size of user trajectory corresponding to user trajectory operation information has multiple, such as, can be the length and width size calculating user trajectory, also can be calculate approximate rectangular window size corresponding to user trajectory.The embodiment of the present invention does not do concrete restriction to this.
C12, calculates the size of gesture path corresponding to gesture path encrypted message;
C13, calculates the proportionality coefficient of the size of gesture path and the size of user trajectory;
In this step, different according to the method for the size calculating user trajectory, to there being corresponding proportionality coefficient computational methods, the embodiment of the present invention does not do concrete restriction to this.In the embodiment of the present invention, the concrete computational process of proportionality coefficient is known technology, omits detailed description at this.
C14, according to the proportionality coefficient calculated, carries out convergent-divergent to user trajectory;
In this step, carrying out convergent-divergent to user trajectory, is be convenient to compare with gesture path.
C15, calculates the user trajectory of convergent-divergent and the trajectory error of described gesture path, if the trajectory error calculated is not more than the trajectory error threshold value pre-set, determines non-input formula access code information match in the mapping table of user's operation information and structure.
In this step, as previously mentioned, if gesture path encrypted message adopts JiuGongTu to obtain, line of vector interior joint that then can be corresponding according to the gesture path encrypted message stored, by line of vector interior joint station location marker in corresponding user trajectory, and according to the order that user trajectory is formed, the vector of node before and after sequentially calculating, and with corresponding line of vector in before and after this vector of node compare, if both vector differences are not more than the vector difference threshold value pre-set, show that before and after this, node matches in user trajectory and gesture path; If in user trajectory and gesture path, all front and back node all matches, and determines non-input formula access code information match in the mapping table of user's operation information and structure.
If user's operation information is user speech operation information, determine that in the mapping table of user's operation information and structure, non-input formula access code information match comprises:
Resolve user speech operation information, obtain the text message comprised in user speech operation information, the text message corresponding with speech cipher information compares, if both are identical, determines non-input formula access code information match in the mapping table of user's operation information and structure.
In the embodiment of the present invention, non-input formula access code information match in the mapping table of additive method determination user speech operation information and structure can also be adopted, such as, can adopt pattern matching method, characteristic matching method etc., the embodiment of the present invention does not do concrete restriction to this.
About the matching process of user fingerprints operation information, with user speech operation information to mate flow process similar, no longer enumerate at this.
Further, the embodiment of the present invention can also comprise:
If when the access code of non-input formula described in the mapping table of described user's operation information and described structure information does not match, do not enter the process of described privacy area.
In this step, the non-input formula access code information in the mapping table of user's operation information and structure that is arranged on does not match, and does not do any process.Like this, when can make the information input error of non-input formula access code, do not give any feedback of user.Like this, user does not worry the possibility that the privacy area entrance arranged is exposed, and ensure that user does not worry that input reference encrypted message process causes and feeds back and the problem of the privacy entrance that sticks one's chin out.That is, the access code information of privacy area entrance is drawn mistake and can not be given any feedback of user, ensure that the thing that user can not be allowed to arrange privacy area is revealed, thus strengthens the fail safe of privacy information.
In the embodiment of the present invention, because privacy area is not provided with entrance access rights, and each privacy area is provided with mutually different non-input formula access code information, thus, can obtain user's operation information at arbitrary display interface.Like this, though user privacy area is hidden enough dark, such as, be arranged in the sub-display interface of multilayer, also can perform privacy area access at same display interface, thus reduce the required flow process performed of privacy area access, simplified access operates, and promotes access efficiency.Further, in the embodiment of the present invention, owing to not needing to go to specific position to access privacy area, achieve and privacy area is hidden among normal display interface, there is no real access entrance, but be access entrance everywhere, simplify the troublesome operation that user enters privacy area, overcoming prior art cannot the technical problem of privacy area self entrance.And the design of multiple privacy area, also ensure that the user that can take access code information cannot determine whether there is privacy area, solving is forced wants access code information and finds the technical problem of privacy content.
As embodiment, the method comprises further:
Step 104, monitor user exit in privacy area data file access, hide described privacy area.
In this step, the privacy area entrance that privacy area is not fixed, as long as non-input formula access code information is correct, privacy area can be activated, in the process of input non-input formula access code information, in respective interface, any change does not occur, just carry out judging and mating on program backstage, user is without any perception.As user, to input non-input formula access code information correct, then can enter into the privacy area that this non-input formula access code information is corresponding, and can access and be stored in any data file in this privacy area and information, after access, privacy area is hidden by terminal equipment automatically.
In practical application, the method can further include:
The mapping table of the privacy area of structure and non-input formula access code information is uploaded to cloud server store;
The mapping table receiving user obtains request, by after the certification of cloud server, and the mapping table that this user obtaining storing from cloud server is corresponding.
In the embodiment of the present invention, by Servers installed account system beyond the clouds, for storing the mapping table of privacy area that user builds and non-input formula access code information.Like this, the mapping table that user can be made to arrange can realize cross-platform application, without the need to arranging mapping table respectively for each platform; Further, after mobile terminal deletes mapping table, can continue server beyond the clouds and preserve the map information of user's setting.Certainly, in practical application, in order to ensure the fail safe of user privacy information, map information is being uploaded to cloud server, or cloud server carries out safety certification, when issuing map information to user, can be encrypted map information, and the encryption map information that mobile terminal is receiving cloud server and issues, be stored in the memory location pre-set after being decrypted, do not show the map information of deciphering to user.
Fig. 2 is the method idiographic flow schematic diagram of the process private space that the embodiment of the present invention provides.See Fig. 2, take terminal equipment as Android mobile phone, data file for application program be example, this flow process comprises:
Step 201, installs Android operation system starter;
In this step, after the success of Android operation system starter erection, starter becomes the entrance that user enters Android mobile phone, and in starter, complete the operation of access application.
Step 202, enters starter and arranges interface, draws the non-input formula access code information for accessing privacy area;
In this step, after the success of drafting non-input formula access code information also confirms, namely generate the privacy area that this non-input formula access code information is corresponding.In the embodiment of the present invention, multiple privacy area and corresponding non-input formula access code information of drawing multiple privacy area can be set.Wherein, under multiple privacy area can be arranged on different catalogues.
Step 203, application program user chosen moves to the privacy area of setting;
In this step, after privacy area creates successfully, namely user can move to needing the application program hidden in this privacy area, and the application program (icon) moved in this privacy area is not shown in starter.
Step 204, receives the non-input formula access code information that user inputs at starter interface;
In this step, during user's routine use starter, whenever at starter interface, length is pinned screen and is started to draw non-input formula access code information, activating pin judgement is carried out in triggering, and in drafting non-input formula access code information process, starter does not respond any operation of user, namely starter does not give any feedback of user, to tell that user is drawing non-input formula access code information at present.
Step 205, determines the non-input formula access code information that user inputs and pre-rendered non-input formula access code information match, enters privacy area and carry out application program access;
In this step, when the non-input formula access code information of the current drafting of user meets pre-rendered non-input formula access code information completely, then open the privacy area that this non-input formula access code information is corresponding, thus user can be accessed be stored in any application program or the information of this privacy area; And when the non-input formula access code INFORMATION OF INCOMPLETE of the current drafting of user meets pre-rendered non-input formula access code information, do not give any feedback of user, be namely equivalent to the operation not occurring to draw non-input formula access code information.
Step 206, monitors user and leaves privacy area, automatically close privacy area.
In the embodiment of the present invention, when the same privacy area of user's access next time, still need to draw correct non-input formula access code information and just can enter.
Embodiment two, private space processing unit.
Fig. 3 is the private space processing unit structural representation that the embodiment of the present invention provides.See Fig. 3, this device comprises: privacy area arranges module, mapping table builds module, data file arranges module and Access Control Module, wherein,
Privacy area arranges module, for setting a property as the privacy area hidden;
In the embodiment of the present invention, the privacy area of setting is one or more.
As embodiment, the store path information for identifying privacy area position can also be set.Multiple privacy area can corresponding same store path information, and store path information that also can be corresponding different, specifically can be arranged according to the actual needs of user.
Mapping table builds module, and the described privacy area for arranging module for described privacy area arranges non-input formula access code information, builds the mapping table that described privacy area is corresponding with described non-input formula access code information;
In the embodiment of the present invention, non-input formula access code information includes but not limited to: gesture path encrypted message and/or, speech cipher information and/or, finger-print cipher information.
As embodiment, mapping table builds module and comprises: receiving element, display unit, track operation acquiring unit and gesture path encrypted message generation unit (not shown), wherein,
Receiving element, arranges request, to display unit output notice for receiving gesture path encrypted message;
Display unit, for according to the notice received, presents gesture path encrypted message and arranges window;
Track operation acquiring unit, the track arranged in window at gesture path encrypted message for obtaining user operates, and exports gesture path encrypted message generation unit to;
Gesture path encrypted message generation unit, for based on the track operation information obtained, obtains gesture path encrypted message.
In the embodiment of the present invention, the gesture path encrypted message that display unit presents is arranged in window shows there is JiuGongTu, then track operation acquiring unit comprises: starting point determination subelement, terminal determination subelement and vector generate subelement, wherein,
Starting point determination subelement, for after monitoring user trajectory operation and JiuGongTu interracial contact, obtains the starting point that user trajectory operates in gesture path on JiuGongTu;
In the embodiment of the present invention, user trajectory operation includes but not limited to: the operation of mouse action, felt pen and finger manipulation.
Terminal determination subelement, for monitoring after user trajectory operation contacts with JiuGongTu interface unbound, acquisition user trajectory is operating in the terminal of gesture path on JiuGongTu;
Vector generates subelement, and the subgraph in the JiuGongTu experienced between the terminal for the starting point to gesture path that sequentially obtain gesture path also connects into line of vector, as the track operation information obtained, exports gesture path encrypted message generation unit to.
Preferably, mapping table structure module can further include:
Gesture path encrypted message authentication unit, for monitoring after gesture path encrypted message generation unit obtains gesture path encrypted message, the gesture path password authentication information that prompting user input is identical with gesture path encrypted message; Receive gesture path password authentication information, determine that the gesture path password authentication information received mates with gesture path encrypted message, determine that gesture path encrypted message is arranged successfully.
Data file arranges module, for choosing data file and putting into the described privacy area that described privacy area arranges module;
Access Control Module, for monitoring and obtaining user's operation information, determine non-input formula access code information match described in the mapping table that described user's operation information and described mapping table build module construction, show and enter the privacy area of described non-input formula access code information MAP.
In the embodiment of the present invention, user, after entering privacy area, can perform data file access.User's operation information includes but not limited to one of following: user trajectory operation information, user speech operation information and user fingerprints operation information.
Preferably, if Access Control Module is further used for, when non-input formula access code information does not match described in the mapping table of described user's operation information and described structure, not entering the process of described privacy area.
If user's operation information is user trajectory operation information, Access Control Module can comprise: monitoring means, the first computing unit, the second computing unit, proportionality coefficient unit, unit for scaling and access privilege control unit (not shown), wherein
Monitoring means, for monitoring and obtaining user trajectory operation information;
First computing unit, for calculating the size of user trajectory corresponding to user trajectory operation information;
Second computing unit, for calculating the size of gesture path corresponding to gesture path encrypted message;
Proportionality coefficient unit, for the proportionality coefficient of the size of the size and user trajectory that calculate gesture path;
Unit for scaling, for according to the proportionality coefficient calculated, carries out convergent-divergent to user trajectory;
Access privilege control unit, for the trajectory error of the user trajectory and described gesture path that calculate convergent-divergent, if the trajectory error calculated is not more than the trajectory error threshold value pre-set, determine non-input formula access code information match in the mapping table of user's operation information and structure.
As embodiment, this device can further include:
Log information arranges module, for choosing the privacy area of setting, and the store path information at the privacy area place chosen is set to the store path information of the log information produced for store access data file.
As seen through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add required general hardware platform by software and realizes.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product can be stored in storage medium, as ROM/RAM, magnetic disc, CD etc., comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform the method described in some part of each embodiment of the present invention or embodiment.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, between each embodiment identical similar part mutually see, what each embodiment stressed is the difference with other embodiments.Especially, for the embodiment of device or system, because it is substantially similar to embodiment of the method, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.Apparatus and system embodiment described above is only schematic, the wherein said unit illustrated as separating component or can may not be and physically separates, parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of module wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.Those of ordinary skill in the art, when not paying creative work, are namely appreciated that and implement.
Above the method for process private space provided by the present invention and private space processing unit are described in detail, apply specific case herein to set forth principle of the present invention and execution mode, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping; Meanwhile, for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications.In sum, this description should not be construed as limitation of the present invention.

Claims (22)

1. one kind processes the method for private space, it is characterized in that, set a property as the privacy area hidden, and non-input formula access code information is set for described privacy area, build the mapping table that described privacy area is corresponding with described non-input formula access code information, choose data file and put into the described privacy area of setting;
The method comprises:
Monitor and obtain user's operation information, non-input formula access code information match described in the mapping table determining described user's operation information and structure, show and enter the privacy area of described non-input formula access code information MAP;
Monitor user exit in privacy area data file access, hide described privacy area.
2. the method for claim 1, is characterized in that, described method comprises further:
If when the access code of non-input formula described in the mapping table of described user's operation information and described structure information does not match, do not enter the process of described privacy area.
3. method as claimed in claim 1 or 2, it is characterized in that, described non-input formula access code information includes but not limited to: gesture path encrypted message and/or, speech cipher information and/or, finger-print cipher information.
4. method as claimed in claim 3, it is characterized in that, described non-input formula access code information is gesture path encrypted message, and the described step arranging non-input formula access code information comprises:
Receive gesture path encrypted message and request is set, present gesture path encrypted message and window is set;
Acquisition user arranges the track operation in window at gesture path encrypted message, and obtains gesture path encrypted message based on the track operation obtained.
5. method as claimed in claim 4, it is characterized in that, described gesture path encrypted message arranges in window the JiuGongTu providing and arrange for gesture path encrypted message, described acquisition user arranges operation trace in window at gesture path encrypted message, and specifically comprises based on the step that the operation trace obtained obtains gesture path encrypted message:
After monitoring user trajectory operation and JiuGongTu interracial contact, obtain the starting point that user trajectory operates in gesture path on JiuGongTu;
Monitoring after user trajectory operation contacts with JiuGongTu interface unbound, acquisition user trajectory operates in the terminal of gesture path on JiuGongTu;
The starting point sequentially obtaining gesture path to gesture path terminal between subgraph in the JiuGongTu that experiences connect into line of vector, obtain gesture path encrypted message.
6. method as claimed in claim 4, is characterized in that, described obtain gesture path encrypted message after, described method comprises further:
The gesture path password authentication information that prompting user input is identical with gesture path encrypted message;
Receive gesture path password authentication information, determine that the gesture path password authentication information received mates with gesture path encrypted message, determine that gesture path encrypted message is arranged successfully.
7. method as claimed in claim 4, is characterized in that, described connect into line of vector after, before obtaining gesture path encrypted message, described method comprises further:
The gesture path connecting into line of vector is shown on screen;
Receive the confirmation of user's input, described in execution, obtain the flow process of gesture path encrypted message.
8. method as claimed in claim 3, it is characterized in that, described non-input formula access code information is speech cipher information, and the described step arranging non-input formula encrypted message comprises:
Receive speech cipher information setting request, present speech cipher information and window is set;
Recording user arranges the phonetic feature in window in speech cipher information, obtain speech cipher information.
9. the method for claim 1, is characterized in that, described method comprises further:
Choose the described privacy area of setting, and the store path information at the described privacy area place chosen is set to the store path information of the log information produced for store access data file.
10. the method for claim 1, is characterized in that, described user's operation information includes but not limited to one of following: user trajectory operation information, user speech operation information and user fingerprints operation information.
11. methods as claimed in claim 10, it is characterized in that, described user's operation information is user trajectory operation information, and the step of the information match of non-input formula access code described in the described mapping table determining user's operation information and described structure comprises:
Calculate the size of user trajectory corresponding to user trajectory operation information;
Calculate the size of gesture path corresponding to gesture path encrypted message;
Calculate the proportionality coefficient of the size of gesture path and the size of user trajectory;
According to the proportionality coefficient calculated, convergent-divergent is carried out to user trajectory;
Calculate the user trajectory of convergent-divergent and the trajectory error of described gesture path, if the trajectory error calculated is not more than the trajectory error threshold value pre-set, determine non-input formula access code information match in the mapping table of user's operation information and structure.
12. methods as claimed in claim 10, it is characterized in that, described user's operation information is user speech operation information, and the step of the information match of non-input formula access code described in the described mapping table determining user's operation information and described structure comprises:
Resolve user speech operation information, obtain the text message comprised in user speech operation information, the text message corresponding with speech cipher information compares, if both are identical, non-input formula access code information match described in the mapping table determining described user's operation information and described structure.
13. the method for claim 1, is characterized in that, described method comprises further:
Monitor user exit in privacy area data file access, hide described privacy area.
14. the method for claim 1, is characterized in that, described method comprises further:
The quantity of described privacy area is one or more, and for each privacy area arranges corresponding store path information, each privacy area correspondence described is provided with one or more gesture path encrypted message.
15. methods as claimed in claim 14, it is characterized in that, described method comprises further:
The mapping table of the privacy area of structure and non-input formula access code information is uploaded to cloud server store;
The mapping table receiving user obtains request, by after the certification of cloud server, and the mapping table that this user obtaining storing from cloud server is corresponding.
16. 1 kinds of private space processing unit, is characterized in that, this private space processing unit comprises: privacy area arranges module, mapping table builds module, data file arranges module and Access Control Module, wherein,
Privacy area arranges module, for setting a property as the privacy area hidden;
Mapping table builds module, and the described privacy area for arranging module for described privacy area arranges non-input formula access code information, builds the mapping table that described privacy area is corresponding with described non-input formula access code information;
Data file arranges module, for choosing data file and putting into the described privacy area that described privacy area arranges module;
Access Control Module, for monitoring and obtaining user's operation information, determine non-input formula access code information match described in the mapping table that described user's operation information and described mapping table build module construction, show and enter the privacy area of described non-input formula access code information MAP.
17. privacy information processing unit as claimed in claim 16, it is characterized in that, if described Access Control Module is further used for, when non-input formula access code information does not match described in the mapping table of described user's operation information and described structure, not entering the process of described privacy area.
18. privacy information processing unit as described in claim 16 or 17, it is characterized in that, described non-input formula access code information includes but not limited to: gesture path encrypted message and/or, speech cipher information and/or, finger-print cipher information.
19. privacy information processing unit as described in claim 16 or 17, is characterized in that, described mapping table builds module and comprises: receiving element, display unit, track operation acquiring unit and gesture path encrypted message generation unit, wherein,
Receiving element, arranges request, to display unit output notice for receiving gesture path encrypted message;
Display unit, for according to the notice received, presents gesture path encrypted message and arranges window;
Track operation acquiring unit, the track arranged in window at gesture path encrypted message for obtaining user operates, and exports gesture path encrypted message generation unit to;
Gesture path encrypted message generation unit, for based on the track operation information obtained, obtains gesture path encrypted message.
20. privacy information processing unit as claimed in claim 19, it is characterized in that, the gesture path encrypted message that described display unit presents is arranged in window shows there is JiuGongTu, described track operation acquiring unit comprises: starting point determination subelement, terminal determination subelement and vector generate subelement, wherein
Starting point determination subelement, for after monitoring user trajectory operation and JiuGongTu interracial contact, obtains the starting point that user trajectory operates in gesture path on JiuGongTu;
Terminal determination subelement, for monitoring after user trajectory operation contacts with JiuGongTu interface unbound, acquisition user trajectory is operating in the terminal of gesture path on JiuGongTu;
Vector generates subelement, and the subgraph in the JiuGongTu experienced between the terminal for the starting point to gesture path that sequentially obtain gesture path also connects into line of vector, as the track operation information obtained, exports gesture path encrypted message generation unit to.
21. privacy information processing unit as claimed in claim 19, is characterized in that, described mapping table builds module and comprises further:
Gesture path encrypted message authentication unit, for monitoring after gesture path encrypted message generation unit obtains gesture path encrypted message, the gesture path password authentication information that prompting user input is identical with gesture path encrypted message; Receive gesture path password authentication information, determine that the gesture path password authentication information received mates with gesture path encrypted message, determine that gesture path encrypted message is arranged successfully.
22. privacy information processing unit as described in claim 16 or 17, is characterized in that, comprise further:
Log information arranges module, for choosing the described privacy area of setting, and the store path information at the described privacy area place chosen is set to the store path information of the log information produced for store access data file.
CN201410277101.3A 2014-06-19 2014-06-19 Privacy space processing method and privacy space processing device Pending CN105471811A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410277101.3A CN105471811A (en) 2014-06-19 2014-06-19 Privacy space processing method and privacy space processing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410277101.3A CN105471811A (en) 2014-06-19 2014-06-19 Privacy space processing method and privacy space processing device

Publications (1)

Publication Number Publication Date
CN105471811A true CN105471811A (en) 2016-04-06

Family

ID=55609088

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410277101.3A Pending CN105471811A (en) 2014-06-19 2014-06-19 Privacy space processing method and privacy space processing device

Country Status (1)

Country Link
CN (1) CN105471811A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847130A (en) * 2016-05-12 2016-08-10 腾讯科技(深圳)有限公司 Instant messaging application chatting record processing method and device
CN106372536A (en) * 2016-10-13 2017-02-01 上海巍擎信息技术有限责任公司 Privacy information protection method and device, and creation method for device
CN106844457A (en) * 2016-12-20 2017-06-13 北京奇虎科技有限公司 Cloud server and its document handling method and device
CN107070646A (en) * 2017-01-17 2017-08-18 浙江工业大学 The safe and reliable network transfer method hidden based on password
CN107133507A (en) * 2017-04-20 2017-09-05 北京安云世纪科技有限公司 A kind of privacy services system access method, device and mobile terminal
WO2018014378A1 (en) * 2016-07-19 2018-01-25 中兴通讯股份有限公司 Method and apparatus for sharing information between user spaces, and terminal
WO2018023574A1 (en) * 2016-08-04 2018-02-08 薄冰 Adjustment method for using gesture to open file folder, and file system
WO2018023571A1 (en) * 2016-08-04 2018-02-08 薄冰 Method and mobile phone system for stopping using gesture-matched software technique
WO2018023573A1 (en) * 2016-08-04 2018-02-08 薄冰 Method for stopping technology where gesture matches file folder according to user response, and file system
CN108804932A (en) * 2018-05-29 2018-11-13 北京珠穆朗玛移动通信有限公司 Picture storage method, mobile terminal and storage medium
CN109085976A (en) * 2018-08-09 2018-12-25 珠海格力电器股份有限公司 interface hiding method and device
CN109815662A (en) * 2018-12-06 2019-05-28 北京握奇智能科技有限公司 Gesture password identity identifying method and system under a kind of TEE environment
CN111258689A (en) * 2020-01-09 2020-06-09 成都市新筑路桥机械股份有限公司 Tramcar man-machine interaction interface page management method
CN112231758A (en) * 2020-11-03 2021-01-15 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102938801A (en) * 2012-10-30 2013-02-20 北京小米科技有限责任公司 Method and device for processing private messages
CN103077357A (en) * 2013-01-18 2013-05-01 浙江长天信息技术有限公司 Method for storing private files
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN103793636A (en) * 2012-11-01 2014-05-14 华为技术有限公司 Equipment and method for protecting privacy thereof
CN104008313A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Protecting method and device of privacy information

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN102938801A (en) * 2012-10-30 2013-02-20 北京小米科技有限责任公司 Method and device for processing private messages
CN103793636A (en) * 2012-11-01 2014-05-14 华为技术有限公司 Equipment and method for protecting privacy thereof
CN103077357A (en) * 2013-01-18 2013-05-01 浙江长天信息技术有限公司 Method for storing private files
CN104008313A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Protecting method and device of privacy information

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847130A (en) * 2016-05-12 2016-08-10 腾讯科技(深圳)有限公司 Instant messaging application chatting record processing method and device
WO2018014378A1 (en) * 2016-07-19 2018-01-25 中兴通讯股份有限公司 Method and apparatus for sharing information between user spaces, and terminal
WO2018023573A1 (en) * 2016-08-04 2018-02-08 薄冰 Method for stopping technology where gesture matches file folder according to user response, and file system
WO2018023574A1 (en) * 2016-08-04 2018-02-08 薄冰 Adjustment method for using gesture to open file folder, and file system
WO2018023571A1 (en) * 2016-08-04 2018-02-08 薄冰 Method and mobile phone system for stopping using gesture-matched software technique
CN106372536A (en) * 2016-10-13 2017-02-01 上海巍擎信息技术有限责任公司 Privacy information protection method and device, and creation method for device
CN106372536B (en) * 2016-10-13 2020-05-12 上海巍擎信息技术有限责任公司 Method and device for protecting privacy information and method for creating device
CN106844457A (en) * 2016-12-20 2017-06-13 北京奇虎科技有限公司 Cloud server and its document handling method and device
CN107070646B (en) * 2017-01-17 2020-01-14 浙江工业大学 Safe and reliable network transmission method based on password hiding
CN107070646A (en) * 2017-01-17 2017-08-18 浙江工业大学 The safe and reliable network transfer method hidden based on password
CN107133507A (en) * 2017-04-20 2017-09-05 北京安云世纪科技有限公司 A kind of privacy services system access method, device and mobile terminal
CN108804932A (en) * 2018-05-29 2018-11-13 北京珠穆朗玛移动通信有限公司 Picture storage method, mobile terminal and storage medium
CN109085976A (en) * 2018-08-09 2018-12-25 珠海格力电器股份有限公司 interface hiding method and device
CN109815662A (en) * 2018-12-06 2019-05-28 北京握奇智能科技有限公司 Gesture password identity identifying method and system under a kind of TEE environment
CN111258689A (en) * 2020-01-09 2020-06-09 成都市新筑路桥机械股份有限公司 Tramcar man-machine interaction interface page management method
CN112231758A (en) * 2020-11-03 2021-01-15 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN112231758B (en) * 2020-11-03 2023-11-17 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification

Similar Documents

Publication Publication Date Title
CN105471811A (en) Privacy space processing method and privacy space processing device
US11606320B2 (en) Dynamic application configuration
US11770351B2 (en) Multiple application list prioritization
CN111241517B (en) Method and device for constructing biological feature verification question-answer library
CN102780653B (en) Quick method, client and the system communicated in instant messaging
KR20180072148A (en) Method for managing contents and electronic device for the same
CN111601115B (en) Video detection method, related device, equipment and storage medium
CN106415664A (en) System and methods of generating user facial expression library for messaging and social networking applications
CN106681717B (en) Terminal application program management method and device and electronic equipment
US20170366564A1 (en) Identity authentication method, apparatus, and system
EP2904537A2 (en) Secure identification of computing device and secure identification methods
CN105794155B (en) Method, device and equipment for displaying message
CN110598441A (en) User privacy protection method and device
CN106030527B (en) By the system and method for application notification user available for download
CN110324314A (en) User registering method and device, storage medium, electronic equipment
CN105354459B (en) Information processing method and device and electronic equipment
CN109561212A (en) A kind of merging method of release information, device, equipment and storage medium
CN113010248A (en) Operation guiding method and device and electronic equipment
CN105100005B (en) Identity verification method and device
CN107066864B (en) Application icon display method and device
CN111831991A (en) Input operation detection method, device, computing equipment and medium
CN105025482B (en) Communication information processing method and equipment thereof
CN110019270B (en) Information updating method and device, terminal, server and readable storage medium
CN113413590A (en) Information verification method and device, computer equipment and storage medium
CN109104759B (en) Interaction method of electronic equipment, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160406

RJ01 Rejection of invention patent application after publication